Tag Archive for: Japan

Embassy of China in Canada Issues a Statement on U.S Cyber Espionage Campaigns Against Japan


I just came across to a statement issued by the Embassy of China in Canada on the U.S cyber espionage campaigns launched against Japan.

What’s so special about this statement? First it does quite Wikileaks which is a bit of an outdated approach including the actual source to shed more light into a bigger problem and issue for China that the press statement on the Web site of the Chinese Embassy in Canada mentions. In this specific case the statement implies the use of the so called “hunt-forward” missions which could really mean big trouble for China if the U.S somehow manages to secure a deal with a neighbouring country next to China which could really mean big trouble for China as the U.S will then attempt to establish the foundation for a successful cyber attacks and possibly information operations interception campaigns used managed and operated by China including its partners and allies where to ultimate goal would be to measure their true capabilities and set the foundation for a successful cyber situational awareness campaign in terms of cyber attacks and the true state of China’s true cyberspace operations and cyber attack capabilities including the capabilities of some of its neighbouring countries.

The so called Hunt Forward Operations also known as (HFOs) are an early warning system for cyber situational awareness that could improve the true state of the visibility of the actual country that’s doing these missions in this specific case the U.S could really learn a lot about new tactics and techniques courtesy of the attackers based in the specific country where it’s hosting its mission which could be really bad news for China in terms of having the U.S deploy hunt forward missions in its neighbouring countries where the U.S could really get a better picture of China’s understanding and actual applicability of basic cyber warfare principles and concepts in action including the “know-how” of its neighbouring countries.

Despite the fact that the U.S is willing to share its knowledge and understanding of cyber attacks “know-how” with the host country of a hunt forward mission it could also learn a lot about the cyber attacks that originate from the…

Source…

Warren Buffett says ‘we’re not done’ investing in Japan


OMAHA, U.S. — Warren Buffett’s Berkshire Hathaway has more investments in store for Japan, the billionaire told shareholders Saturday at the company’s first in-person annual meeting since the start of the COVID-19 pandemic.

Asked by longtime business partner Charlie Munger to explain why Berkshire bought big stakes in Japanese trading companies Mitsubishi Corp., Sumitomo Corp., Mitsui and Co., Itochu and Marubeni, Buffett said the decision was “simple.”

Source…

Japan braced for rise in ransomware attacks after data breach


A hacking attack at Japan’s largest IT company is spilling across the country’s corporate sector, with cyber security experts warning that it could trigger a surge in attempts by organised criminal gangs to extort hefty ransoms from companies and their customers.

More than 10 Japanese companies have said in the past month that they have been affected by the hacking at Fujitsu, which supplies internet infrastructure to thousands of companies. The attack took place last year and allowed outside access to emails sent through a Fujitsu-based email system.

Fujitsu admitted last year that it was hacked but refused to disclose how many of its customers were targeted.

Tokio Marine & Nichido Fire, which is one of Japan’s largest underwriters of corporate insurance against cyber attacks and a prime target for ransomware gangs, acknowledged to customers last month that it was one of the companies potentially affected by the Fujitsu leak, according to two sources.

Tokio Marine began writing to its corporate clients to discuss the possible impact of the breach and the potential loss of sensitive data, said two people familiar with the matter.

“The response from Tokio Marine is very significant. Clients of insurers share a lot of data that ransomware gangs target, and there will be a lot of concern around what kind of access the hackers got,” said one cyber security analyst who advises a large listed company affected by the incident.

Tokio Marine said it took the situation seriously and was addressing the incident.

The technology giant Kyocera, clothing maker Goldwin and property developer Sekisui House have all said within the past month that they are also among the companies affected by the Fujitsu incident.

Cyber security experts said that the attack on Fujitsu was consistent with the tactics of highly professionalised gangs in Russia and Belarus who target Japanese companies and organisations because they often have relatively low-level defences, and their willingness to pay a ransom tends to be high. Experts said that the Cuba and LockBit ransomware gangs had been especially active in Japan over the past 18 months.

The cyber security consultancy IBM Security said in its 2022…

Source…

India 2nd most targeted by ransomware in Asia Pacific, Japan region in 2022




India is the second most targeted country by ransomware in the and Japan region in 2022, up from spot 3 in 2021, a new report said on Tuesday.


In 2022, Maharashtra was the most-targeted state with 36 per cent of ransomware attacks, while New Delhi was at second, according to the Palo Alto Networks 2023 Unit 42 Ransomware and Extortion report.


“Ransomware and extortion groups are forcing their victims into a pressure cooker, with the ultimate goal of increasing their chances of getting paid,” said Wendi Whitmore, senior vice president and head of Unit 42 at Palo Alto Networks.


Moreover, the report mentioned that manufacturing, construction, and professional & legal services were the most targeted industries.


The most active ransomware groups include Lockbit 2.0, BianLian, and Stormous.


Further, the report found that data theft was the most common of the extortion tactics, with 70 per cent of groups using it by late 2022 — a 30 per cent increase from the year prior.


Organisations based in the US were most severely publicly affected, with 42 per cent of the observed leaks in 2022, followed by Germany and the UK, accounting for nearly 5 per cent each.


The report also said that 30 organisations on the Forbes Global 2000 list were publicly impacted by extortion attempts in 2022.


Since 2019, at least 96 of these organisations have had confidential files publicly exposed to some degree as part of attempted extortion.


–IANS


shs/vd

(Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)


Source…